scispace - formally typeset
Journal ArticleDOI

A chaos-based joint image compression and encryption scheme using DCT and SHA-1

Ching-Hung Yuen, +1 more
- Vol. 11, Iss: 8, pp 5092-5098
TLDR
A chaos-based joint image compression and encryption algorithm using discrete cosine transformation (DCT) and Secure Hash Algorithm-1 (SHA-1) is proposed that is efficient and highly sensitive to both the key and the plain-image.
Abstract
A chaos-based joint image compression and encryption algorithm using discrete cosine transformation (DCT) and Secure Hash Algorithm-1 (SHA-1) is proposed. As SHA-1 is fast and input-sensitive, it is employed to enhance the diffusion effect on image pixels. The DCT coefficients of the whole image are separated into two sequences for mutual interaction. The sequence of low-frequency coefficients, together with the secret keys, generates a message digest to perturb another sequence composed of high-frequency coefficients. The last cipher block of the high-frequency sequence is used as a feedback to control the diffusion and permutation in the low-frequency sequence. Huffman code is chosen as the entropy coding to compress the encrypted chains. Experimental results confirm that our algorithm is efficient and highly sensitive to both the key and the plain-image.

read more

Citations
More filters
Journal ArticleDOI

A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem

TL;DR: A new image encryption scheme integrated with compression simultaneously that first uses 2D hyper-chaos discrete nonlinear dynamic system to shuffle the plain image, and then applies Chinese remainder theorem to diffuse and compress the shuffled image, simultaneously.
Journal ArticleDOI

A novel image encryption based on hash function with only two-round diffusion process

TL;DR: It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements.
Journal ArticleDOI

An efficient image encryption scheme using lookup table-based confusion and diffusion

TL;DR: Simulations prove the advantages of the proposed cryptosystem, which render it a good candidate for real-time secure image applications, and its satisfactory resistance to noise perturbation and loss of cipher data.
Journal ArticleDOI

A novel image encryption scheme based on Brownian motion and PWLCM chaotic system

TL;DR: A new digital image encryption scheme to simulate physical phenomena rather than deliberately create rigid rules is proposed, using the Monte Carlo method to simulate a Brownian motion, thus effectively scrambling the image.
Journal ArticleDOI

Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map

TL;DR: An integrated non-dominated sorting genetic algorithm and local chaotic search based image encryption technique is proposed to tune the hyper-parameters of 5 D chaotic map (TFCM).
References
More filters
Book

JPEG: Still Image Data Compression Standard

TL;DR: This chapter discusses JPEG Syntax and Data Organization, the history of JPEG, and some of the aspects of the Human Visual Systems that make up JPEG.
Journal ArticleDOI

A symmetric image encryption scheme based on 3D chaotic cat maps

TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI

A new chaos-based fast image encryption algorithm

TL;DR: A fast image encryption algorithm with combined permutation and diffusion is proposed and an efficient method for generating pseudorandom numbers from spatiotemporal chaos is suggested, which further increases the encryption speed.
Journal ArticleDOI

A fast image encryption scheme based on chaotic standard map

TL;DR: In this paper, the authors proposed to introduce a certain diffusion effect in the substitution stage by simple sequential add-and-shift operations, which leads to a longer processing time in a single round, but reduces the overall encryption time.
Journal ArticleDOI

Design of integrated multimedia compression and encryption systems

TL;DR: This research examines the limitations of selective encryption using cryptanalysis, and proposes another approach that turns entropy coders into encryption ciphers using multiple statistical models that can be applied to most modern compressed audio/video such as MPEG audio, MPEG video, and JPEG/JPEG2000 images.
Related Papers (5)